Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-02-2024 04:37
Behavioral task
behavioral1
Sample
Server11.exe
Resource
win7-20240221-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Server11.exe
Resource
win10v2004-20240221-en
4 signatures
150 seconds
General
-
Target
Server11.exe
-
Size
93KB
-
MD5
d888c07a6879d77124aa52938acf9ab9
-
SHA1
fa359a08e8c19b324a26fde61a144ae57beccbd1
-
SHA256
915be1f438915d9e334d6fd0021073e25a16ac5c0c5e6e8f945b30cbcfbeea90
-
SHA512
8f1c8474f318faea11c408922f35b64826c904c91668d24665564d152eb6ae4d2e39761847ad5cd93f1dfeaf6681ec7474322a2af0a651b960e64e2ec356e42c
-
SSDEEP
768:xY33UYSgmnldjcRoMwrx7Y+DIkIITJbXX0pOt8ux82WXxrjEtCdnl2pi1Rz4Rk3z:8Ummlbrq+1NTZ0OojEwzGi1dD2DCgS
Score
8/10
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4164 netsh.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1760 Server11.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 1760 Server11.exe Token: 33 1760 Server11.exe Token: SeIncBasePriorityPrivilege 1760 Server11.exe Token: 33 1760 Server11.exe Token: SeIncBasePriorityPrivilege 1760 Server11.exe Token: 33 1760 Server11.exe Token: SeIncBasePriorityPrivilege 1760 Server11.exe Token: 33 1760 Server11.exe Token: SeIncBasePriorityPrivilege 1760 Server11.exe Token: 33 1760 Server11.exe Token: SeIncBasePriorityPrivilege 1760 Server11.exe Token: 33 1760 Server11.exe Token: SeIncBasePriorityPrivilege 1760 Server11.exe Token: 33 1760 Server11.exe Token: SeIncBasePriorityPrivilege 1760 Server11.exe Token: 33 1760 Server11.exe Token: SeIncBasePriorityPrivilege 1760 Server11.exe Token: 33 1760 Server11.exe Token: SeIncBasePriorityPrivilege 1760 Server11.exe Token: 33 1760 Server11.exe Token: SeIncBasePriorityPrivilege 1760 Server11.exe Token: 33 1760 Server11.exe Token: SeIncBasePriorityPrivilege 1760 Server11.exe Token: 33 1760 Server11.exe Token: SeIncBasePriorityPrivilege 1760 Server11.exe Token: 33 1760 Server11.exe Token: SeIncBasePriorityPrivilege 1760 Server11.exe Token: 33 1760 Server11.exe Token: SeIncBasePriorityPrivilege 1760 Server11.exe Token: 33 1760 Server11.exe Token: SeIncBasePriorityPrivilege 1760 Server11.exe Token: 33 1760 Server11.exe Token: SeIncBasePriorityPrivilege 1760 Server11.exe Token: 33 1760 Server11.exe Token: SeIncBasePriorityPrivilege 1760 Server11.exe Token: 33 1760 Server11.exe Token: SeIncBasePriorityPrivilege 1760 Server11.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1760 wrote to memory of 4164 1760 Server11.exe 91 PID 1760 wrote to memory of 4164 1760 Server11.exe 91 PID 1760 wrote to memory of 4164 1760 Server11.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\Server11.exe"C:\Users\Admin\AppData\Local\Temp\Server11.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Server11.exe" "Server11.exe" ENABLE2⤵
- Modifies Windows Firewall
PID:4164
-